Answer: AExplanation:Configuring the Traffic Storm Control Shutdown ModeTo configure the traffic storm control shutdown mode on an interface, perform this task:Command PurposeStep 1 Router(config)# interface {{type1 Selects an interface to configure.slot/port} | {port-channel num-ber}}Step 2 Router(config-if)# storm-control (Optional) Configures traffic storm control to action shutdown error- disable ports when a traffic storm occurs.• Enter the no storm-control action shut-down command to revert to the default action (drop).• Use the error disable detection and recov-ery feature, or the shutdown and no shut-down commands to reenable ports.Reference: http://waww.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/storm.html

QUESTION 166When a Cisco Catalyst switch that is configured in VTP server mode is first booted, which two VLAN ranges are loaded on the switch?

A. all VLAN are in the VLAN database.B. VLANs greater than 1005 in the startup-config fileC. the first 1005 VLANs in the VLAN database fileD. the first 1005 VLANs in the startup-config fileE. VLANs greater than 1005 in the VLAN database file

QUESTION 167An enterprise network has port security sticky enabled on all access ports. A network administrator moves a PC from one office desk to another.After the PC is moved, the network administrator clears the port security on the new network switch port connecting to the PC, but the port keeps going back into err-disabled mode.Which two factors are possible causes of this issue? (Choose two)

A. Port security sticky exists on the new network switch port.B. Port security sticky is disabled on the new network switch port.C. Port security must be disabled on all access ports.D. Port security is still enabled on the older network switch port.E. Port security sticky is still enabled on the older network switch port.

Answer: AExplanation:Port Security and Port TypesYou can configure port security only on Layer 2 interfaces. Details about port security and different types of interfaces or ports are as follows:Access ports — You can configure port security on interfaces that you have configured as Layer 2 access ports. On an access port, port security applies only to the access VLAN. Trunk ports — You can configure port security on interfaces that you have configured as Layer 2 trunk ports. VLAN maximums are not useful for access ports. The device allows VLAN maximums only for VLANs associated with the trunk port.SPAN ports — You can configure port security on SPAN source ports but not on SPAN destination ports.Ethernet Port Channels — Port security is not supported on Ethernet port channels.http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_portsec.htmlThese are some other guidelines for configuring port security:Port security can only be configured on static access ports. A secure port cannot be a dynamic access port or a trunk port. A secure port cannot be a destination port for Switch Port Analyzer (SPAN). A secure port cannot belong to an EtherChannel port group. A secure port cannot be an 802.1X port. You cannot configure static secure MAC addresses in the voice VLAN.https://supportforums.cisco.com/t5/network-infrastructure-documents/unable-to-configure-port-security-on-a-catalyst-2940-2950-2955/ta-p/3133064

QUESTION 169Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? (Choose two.)

A. BPDUs will be sent out every two seconds.B. The time spent in the listening state will be 30 seconds.C. The time spent in the learning state will be 15 seconds.D. The maximum length of time that the BPDU information will be saved is 30 seconds.E. This switch is the root bridge for VLAN 200.F. BPDUs will be sent out every 10 seconds.

Answer: BF

QUESTION 170Which three statements are correct with regard to the IEEE 802.1Q standard? (Choose three)

A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameB. The packet is encapsulated with a 26 byte header and a 4 byte FCSC. The protocol uses point-to-multipoint connectivityD. The protocol uses point-to-point connectivityE. The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00F. The IEEE 802.1Q frame retains the original MAC destination address

Answer: ADF

QUESTION 171Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we conclude about interfaces Fa0/13 and Fa0/14?

A. That interfaces Fa0/13 and Fa0/14 are in VLAN 1 B. That interfaces Fa0/13 and Fa0/14 are down C. That interfaces Fa0/13 and Fa0/14 are trunk interfacesD. That interfaces Fa0/13 and Fa0/14 have a domain mismatch with another switch E. That interfaces Fa0/13 and Fa0/14 have a duplex mismatch with another switch

Answer: C

QUESTION 172VLAN maps have been configured on switch R1. Which of the following actions are taken in a VLAN map that does not contain a match clause?

A. Implicit deny feature at end of list.B. Implicit deny feature at start of list.C. Implicit forward feature at end of listD. Implicit forward feature at start of list.

Answer: A

QUESTION 173Given the configuration on a switch interface, what happens when a host with the MAC address of 0003.0003.0003 is directly connected to the switch port?switchport mode accessswitchport port-securityswitchport port-security maximum 2switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown

A. The host will be allowed to connect.B. The port will shut down.C. The host can only connect through a hub/switch where 0002.0002.0002 is already connected.D. The host will be refused access.

Answer: A

QUESTION 174Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?

A. All ports will be in forwarding mode.B. All ports in VLAN 10 will be in forwarding mode.C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in blocking mode.D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in standby mode.

Answer: B

QUESTION 175Which of the following HSRP router states does an active router enter when it is preempted by a higher priority router? (Select the best answer.)

A. activeB. speakC. learnD. listenE. initF. standby

Answer: BExplanation:First we should review all the HSRP States:

Now let’s take an example of a router passing through these states. Suppose there are 2 routers A and B in the network; router A is turned on first. It enters the initial state. Then it moves to listen state in which it tries to hear if there are already active or standby routers for this group. After learning no one take the active or standby state, it determines to take part in the election by moving to speak state. Now it starts sending hello messages containing its priority.These messages are sent to the multicast address 224.0.0.2 (which can be heard by all members in that group). When it does not hear a hello message with a higher priority it assumes the role of active router and moves to active state. In this state, it continues sending out periodic hello messages.Now router B is turned on. It also goes through initial and listen state. In listen state, it learns that router A has been already the active router and no other router is taking standby role so it enters speak state to compete for the standby router -> it promotes itself as standby router.Now to our main question! We want router B to become active router so we set a higher priority number than the priority of A and ask router B to take over the role of active router (with the preempt command). Now router A will fall back to the speak state to compete for active or standby state -> it becomes standby router because its priority is now lower than that of router A. (Therefore answer B is correct).Note: Suppose router A is in active state while router B is in standby state. If router B does not hear hello messages from router A within the holdtime, router B goes into speak state to announce its priority to all HSRP members and compete for the active state. But if at some time it receives a message from the active router that has a lower priority than its priority (because the administrator change the priority in either router), it can take over the active role by sending out a hello packet with parameters indicating it wants to take over the active router. This is called a coup hello message.Reference: http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml